The Flask security architecture: system support for diverse security policies, Proceedings of the 8th USENIX Security Symposium, pp.123-139, 1999. ,
Integrating flexible support for security policies into the linux operating system, Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, 2001. ,
Security Enhanced BSD, Network Associates Laboratories, 2003. ,
A virtual machine introspection based architecture for intrusion detection, Proceedings of the 10th Annual Network and Distributed Systems Security Symposium, 2003. ,
Stealthy malware detection through vmm-b out-ofthe-b semantic view reconstruction, Proceedings of the 14th ACM Conference on Computer and Communications Security, pp.128-138, 2007. ,
DOI : 10.1145/1315245.1315262
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.7412
Lares: An Architecture for Secure Active Monitoring Using Virtualization, 2008 IEEE Symposium on Security and Privacy (sp 2008), p.233247, 2008. ,
DOI : 10.1109/SP.2008.24
Hypervisor support for identifying covertly executing binaries, Proceedings of the 17th USENIX Security Symposium, p.258, 2008. ,
Secure in-VM monitoring using hardware virtualization, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, p.477487, 2009. ,
DOI : 10.1145/1653662.1653720
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.3959
Countering kernel rootkits with lightweight hook protection, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.545-554, 2009. ,
DOI : 10.1145/1653662.1653728
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.9928
SubVirt: implementing malware with virtual machines, 2006 IEEE Symposium on Security and Privacy (S&P'06), 2006. ,
DOI : 10.1109/SP.2006.38
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.684.4485
Xen 0wning trilogy, Black Hat conference, 2008. ,
HyperCheck: A Hardware-Assisted Integrity Monitor, Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection, 2010. ,
DOI : 10.1007/978-3-642-15512-3_9
HyperSentry, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.38-49, 2010. ,
DOI : 10.1145/1866307.1866313
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity, 2010 IEEE Symposium on Security and Privacy, 2010. ,
DOI : 10.1109/SP.2010.30
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.183.7292
Selective hardware/software memory virtualization, proceedings of the 7th ACM Conference on Virtual Execution Environments, p.217226, 2011. ,
DOI : 10.1145/2007477.1952710
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.296.8666
Virtualization system including a virtual machine monitor for a computer with a segmented architecture, p.6397242, 1998. ,
Non-control-data attacks are realistic threats, Proceedings of the 14th conference on USENIX Security Symposium, 2005. ,
Xen and the art of virtualization, Proceedings of the Symposium on Operating System Principles, 2003. ,